Collision-Resistant usage of MD5 and SHA-1 via message preprocessing

作者: Michael Szydlo , Yiqun Lisa Yin

DOI: 10.1007/11605805_7

关键词:

摘要: A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, natural response has been to evaluate extent which various protocols actually depend resistance for their security, potentially schedule an upgrade a stronger function. Other options involve altering protocol in some way. This work suggests different option. We present several simple message pre-processing techniques show how can be combined with or so that applications are no longer vulnerable known attacks. For applications, may viable alternative upgrading

参考文章(20)
Anindya C. Patthak, Charanjit S. Jutla, A Simple and Provably Good Code for SHA Message Expansion. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 247- ,(2005)
Vlastimil Klima, Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications IACR Cryptology ePrint Archive. ,vol. 2005, pp. 102- ,(2005)
Shai Halevi, Hugo Krawczyk, Strengthening Digital Signatures Via Randomized Hashing Lecture Notes in Computer Science. pp. 41- 59 ,(2006) , 10.1007/11818175_3
Vincent Rijmen, Elisabeth Oswald, Update on SHA-1 Lecture Notes in Computer Science. pp. 58- 71 ,(2005) , 10.1007/978-3-540-30574-3_6
Ivan Bjerre Damgård, A design principle for hash functions international cryptology conference. pp. 416- 427 ,(1989) , 10.1007/0-387-34805-0_39
Krystian Matusiewicz, Josef Pieprzyk, Finding Good Differential Patterns for Attacks on SHA-1 Coding and Cryptography. pp. 164- 177 ,(2006) , 10.1007/11779360_14
Philip Hawkes, Gregory G. Rose, Michael Paddon, On Corrective Patterns for the SHA-2 Family. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 207- ,(2004)
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the hash functions MD4 and RIPEMD theory and application of cryptographic techniques. pp. 1- 18 ,(2005) , 10.1007/11426639_1
Ralph C. Merkle, One way hash functions and DES international cryptology conference. pp. 428- 446 ,(1989) , 10.1007/0-387-34805-0_40
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding collisions in the full SHA-1 international cryptology conference. pp. 17- 36 ,(2005) , 10.1007/11535218_2